US20150095501A1 - Network discovery and connection using device addresses not correlated to a device - Google Patents
Network discovery and connection using device addresses not correlated to a device Download PDFInfo
- Publication number
- US20150095501A1 US20150095501A1 US14/044,353 US201314044353A US2015095501A1 US 20150095501 A1 US20150095501 A1 US 20150095501A1 US 201314044353 A US201314044353 A US 201314044353A US 2015095501 A1 US2015095501 A1 US 2015095501A1
- Authority
- US
- United States
- Prior art keywords
- address
- addresses
- temporary
- wireless
- wap
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000002596 correlated effect Effects 0.000 title description 4
- 238000004891 communication Methods 0.000 claims description 43
- 238000004519 manufacturing process Methods 0.000 claims description 16
- 229910003460 diamond Inorganic materials 0.000 description 7
- 239000010432 diamond Substances 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 5
- 238000000034 method Methods 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 2
- 208000007944 Nodular Nonsuppurative Panniculitis Diseases 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 210000001072 colon Anatomy 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5038—Address allocation for local use, e.g. in LAN or USB networks, or in a controller area network [CAN]
-
- H04L61/2084—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5092—Address allocation by self-assignment, e.g. picking addresses at random and testing if they are already in use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/604—Address structures or formats
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
Definitions
- the present application relates generally to enabling users to avoid having their wireless devices being tracked, recorded, and correlated by providing the devices with anonymous addresses for use in network transmissions.
- WPAN wireless personnel area network
- WLAN wireless local area network
- marketed under the Wi-Fi brand and furthermore, as phones, they support cellular network technology.
- WPAN and WLAN technologies provide a convenient way to physically pin-point and track shoppers in a mall so that retailers can know how much time shoppers spend in various parts of a store and in front of store fronts and displays. In this way, the overall time in a store can be measured and effectiveness of store fronts and displays in arresting a shopper's attention can be inferred.
- the number of repeat visits over periods of time can be tracked to learn whether customers are new or repeat.
- Such tracking information ostensibly is useful in rendering shopping more efficient and convenient to the shopper, as tracking information can be used to design more efficient store layouts, more informative signs, and so on such that shoppers can find products more easily.
- monitoring stations are set up e.g. in the stores that act as wireless access points (WAPs) to initiate communication with mobile devices, but where network connectivity cannot be achieved.
- WAPs wireless access points
- monitoring stations are set-up that listen in on the communications between the mobile devices and these nearby WAPs.
- tracking people by means of their devices can even link a shopper's online shopping with his offline shopping, for example, by capturing a customer's name. This can be accomplished by first tracking and then capturing the customer's name right at the cash register when paying with a credit card which usually includes the customer's name, and then later correlating the customer's name to online databases.
- the retailer can then leverage both online and offline behavior against each other to increase sales. For example, the retailer may try to provide a coupon to that customer through email or webpage in order to bring that customer back into the store to shop.
- the device MAC address monitoring it may be possible to track a person to an automobile, a physical residence and place of business. It does not matter that the content delivered over the network to/from that device may have been encrypted as device identifying information, e.g. the MAC address, is typically outside the data payload being protected by encryption.
- SSID service set identifier
- a mobile device configured to search for one these popular SSIDs will communicate in vain with the fake WAP in order to access the ATT or Verizon network.
- video from a webcam it is possible to determine the age group and sex of the customer. Later, when that customer is detected as coming into the store, targeted advertising could be delivered using properly placed video monitors.
- the applications e.g. Facebook
- the applications might reveal if the customer is a child, teenager or young adult.
- the MAC addresses often can reveal the type of mobile device that it is.
- Sony's cell phone has an organizationally unique identifier (OUI) registered as “Sony_Mob” which can be assumed to be “Sony Mobile”—a MAC address assigned to Sony cellphones.
- UUI organizationally unique identifier
- the types of loaded applications can often be inferred.
- Apple iPhones in the ATT network might be expected to always have certain applications loaded.
- Sony Experia smartphone in the Verizon network can be expected to have different applications loaded and running. In store targeted advertising can be directed to those mobile devices and applications.
- wireless device (and, hence, people) tracking is facilitated, however unwittingly, by network communication protocols, in which wireless devices are programmed to automatically seek out wireless access points (WAPs) using exploratory messages, colloquially referred to as “pings”.
- the wireless devices may continue to periodically ping the WAPs regardless of whether the WAP can be successfully accessed, e.g. the security keys are known or can be negotiated. Pinging enables the wireless device to ascertain the best WAP with which to communicate by determining e.g. signal strength, the name of the WAP, and whether or not a security key or credentials are required and available, so that a list of WAPs may be presented to the user for selection.
- the user of the device can browse Internet web pages, use email, send text messages and tweets, communicate by video conferencing, and so on using the WAP.
- the mobile device can usually be programmed to reconnect with the WAP in the future when the device comes into range of the WAP.
- the retailer can take advantage of this fact by faking popular WAPs with SSIDs labeled with, for example, “attwifi” or “verizonwifi”. The device will see the SSID and maintain prolonged contact with the imposter WAP.
- wireless devices In constantly, automatically, and unobtrusively (to the user) reaching out to the network, wireless devices send exploratory messages that include identifiers such as media access control (MAC) addresses.
- MAC media access control
- MAC addresses are unique addresses, often one for each technology the device uses, e.g., one MAC address for Bluetooth, one for Ethernet, and one for Wi-Fi, that are unique to the device and that typically are assigned by the manufacturer of the device from a range allocated to that manufacturer and, hence, correlated to the device.
- MAC addresses can be used for access control to wired local area networks (LAN) and wireless local area network (WLAN).
- LAN local area networks
- WLAN wireless local area network
- every device accessing a wired or wireless network must be known. And this can be done by manually including the MAC in an access control list that the WAP checks in order to create a connection with that device. Presumably, the WAP may be able to determine if the MAC is already in use elsewhere in the corporate environment.
- access control may be done at a higher software layer of functionality that can use public/private key credentials using X.509 certificates and a protocol such as Transport Layer Security (TLS).
- TLS Transport Layer Security
- TLS allows a client device to not only authenticate a server, but for the server to authenticate a client device in a process known as “mutual authentication”.
- the WAP acting as a server, is able to grant access to the network. This can be in addition to or instead of using the MAC for access control.
- many corporate environments are shared with various businesses operating side-by-side. For example, someone could be parked in a car outside a place of business and wirelessly collect information from all the smart devices from the employees of that business. People can also be tracked while travelling in cars. Surreptitious tracking can therefore extend from retail, to vehicles, to residences and even places of business. It is possible to discover where people shop, drive, live and work.
- MAC addresses are usually not used for access control. In many cases, there may be no security at all. The content is sent in-the-clear. In hotels, there is often the need to input a WEP or WAP key to access a WAP. There may be the need to navigate a webpage for authorization, where a room number, name and payment information may be entered. But typically, a hotel does not require identification of the user's MAC address when accessing the wireless network. It is the same situation for most people's wireless home network. The WAP does not need to know the MAC address a priori. And so consequently, in most public places, the MAC address for a WLAN device is simply not checked against an access list.
- the MAC must be unique among the devices accessing the WAP at a particular time and on a particular sub-net, which is important for low level routing of data packets—the so called “link layer”.
- the WAP cares about the MAC as the information that is sent on to remote servers are typically IP datagrams which doesn't include the MAC information on the so called “network layer”.
- the MAC could in fact be re-used with different mobile devices at different times. And different WAPs could have wireless devices accessing them independently with the same MAC at the same time.
- present principles recognize the desirability of having a means to prevent MAC tracking for situations when the WAP does not use the MAC for access control.
- the MAC address used in Ethernet style addressing consists of 48 bits of data. This is potentially a space of 2 48 or 281,474,976,710,656 possible MAC addresses. This is over 281 trillion addresses.
- the first 24 bits of the address may be an organizationally unique identifier (GUI).
- GUI organizationally unique identifier
- the remaining 24 bits are assigned by the owner or assignee of the OUI.
- the address space of the 24 bits is 2 24 or 16,777,216 MAC addresses.
- a device according to present principles “pings” WAPs while roaming e.g. in public spaces uses completely random MACs using the entire 48 bit address space. The chances of a collision with another device with the same randomly chosen address are thus relatively small.
- the device may select a random address using a reduced bit space, e.g. where the OUI bits may be set and the remaining bits are random.
- the MAC may be kept static for the period of the session.
- the addresses in this reduced bit space may still be so large that it would be unlikely for there to be a collision with another device talking to the same WAP.
- present principles recognize that it is possible for the device to monitor other devices communicating with the WAP to make sure that the random MAC chosen is not one that is in use. And if a conflict is detected with one in use, the device may simply change the MAC to a different one. It should be noted that depending on how many devices have the same OUI bits set, it may be possible to use the OUI bits to track a device.
- a device may “ping” WAPs using a MAC chosen from a group of possible MACs associated with a single device.
- a MAC chosen from a group of possible MACs associated with a single device.
- an access list containing a single MAC for a device it could contain, for example, 16 or 32 MAC addresses for a device.
- there would be no correlation between MAC addresses so that by capturing one MAC address the mobile device could not be tracked through the other MAC addresses.
- a number of devices from a manufacturer may share a certain number of MAC addresses.
- devices from the manufacturer come into the store and ping the WAP at different times, they may pick the same MAC.
- the device can monitor traffic to make sure that a shared MAC that is chosen is unique for the instance in time. This would confuse the store's MAC tracking system.
- the data collected along with the analytics would be “corrupted” with MAC addresses that represented communication from multiple devices and not just a single one.
- Present principles recognize a number of possible device behaviors when managing a fixed number of multiple MAC addresses. For example, whenever a public WAP is pinged while roaming around, when changing from one WAP to a different WAP, a different MAC from the group of MACs may be used. Further, the device may maintain the MAC for a period of time, e.g. 4 hours or 8 hours, before changing to another one. However, keeping the period of time short, e.g. 10 minutes, would keep a retailer from using tracking during a store visit which would typically be much long. Keeping the MAC stable may facilitate the hand-off from one WAP to another in case the device is in an active session and moving around (e.g., which may preserve the IP address).
- a device may periodically log-out and back in to a WAP with a different MAC address. A device can therefore do this every 10 or 15 minutes and be hardly noticed by the user since a device can do this fairly rapidly taking a couple of seconds.
- the MACs are not “static” in the sense that their use is limited, meaning that a service provider (SP) of WAPs, e.g. owner of a department store, depending on the device settings cannot track the same MAC around as a person possessing the wireless device roams a store or subsequently visits the same store.
- SP service provider
- MAC access control user-driven data through that WAP may be conducted using the non-anonymous MAC of the device, e.g. unique or chosen from a group of MACs associated with that device, and then when communication with that WAP ceases, the device reverts to using changing anonymous, e.g. random, MACs to ping WAPs during subsequent roaming.
- the group of MACs through which the device cycles when roaming may be issued to the device by the manufacturer of the device, or by the SP of a network of WAPs.
- a device's MAC for a particular network may be non-static in that the group of MACs is cycled through during roaming, so that a monitor of WAPs cannot pin down the shopper using a particular MAC.
- the MAC may be recognized as one of a number of MACs assigned to a particular device. If the WAP cannot handle multiple MACs assigned to a device, then the device may choose one of the MACs as its persistent or permanent MAC. This MAC may be assigned by the manufacturer or the service provider.
- a wireless communication device in another aspect, includes a wireless transceiver and a computer readable storage medium bearing a permanent address associated with the wireless transceiver and uniquely identifying the device and plural temporary addresses.
- the plural temporary addresses are provided by a manufacturer of the device or by a service provider (SP) of a wireless network.
- a processor is configured for accessing the computer readable storage medium to execute instructions which configure the processor for selecting a first temporary address from the plural temporary addresses, and sending a first wireless network message including the first temporary address through the wireless transceiver pursuant to discovering a wireless access point (WAP).
- WAP wireless access point
- the processor selects a second temporary address from the plural temporary addresses and sends a second wireless network message including the second temporary address through the wireless transceiver pursuant to discovering a WAP.
- the addresses can be media access control (MAC) addresses.
- MAC media access control
- the instructions when executed by the processor further configure the processor for using the permanent address for communication of user voice and/or user data messages through the wireless transceiver. This may be desired e.g. for WAPs which perform access control on the MAC and that do not have knowledge of the temporary MAC addresses. If desired, the instructions when executed by the processor further configure the processor for not using the permanent address for communication of user voice and/or user data messages through the wireless transceiver responsive to a signal from a WAP to use the permanent address, and instead using one of the temporary addresses for communication of user voice and/or user data messages through the wireless transceiver in the absence of a signal from a WAP to use the permanent address. Responsive to a signal from a WAP to use the permanent address, the device may cease communication with the WAP, and/or present an alert on the device perceptible by a person that a network does not permit anonymous communication.
- the instructions when executed by the processor may further configure the processor for using the permanent address for communication of user voice and/or user data messages through the wireless transceiver responsive to a signal from a WAP to use the permanent address.
- one of the temporary addresses can be used for communication of user voice and/or user data messages through the wireless transceiver in the absence of a signal from a WAP to use the permanent address.
- each temporary address otherwise indicating a manufacturing entity according to a standard address format is formatted to indicate an entity that does not exist. In this way use of a temporary address does not identify the device with a manufacturing entity.
- the manufacturing entity is often a way to reveal the type of device.
- a method to prevent tracking a wireless device as it roams through a network of wireless access points includes selecting a first temporary MAC address from a group of temporary MAC addresses provided by a device manufacturer or by a service provider (SP) of the WAPs. The method also includes “pinging” for WAPs using the first temporary MAC address, and pinging for subsequent WAPs using a second temporary MAC address.
- WAPs wireless access points
- FIG. 1 is a block diagram of an example wireless communication device (WCD) in one intended environment;
- WCD wireless communication device
- FIG. 2 is a flow chart of example setup logic
- FIG. 3 is a screen shot of an example display permitting a user of the WCD to establish a privacy preference
- FIGS. 4-7 are flow charts of example roaming logic.
- a wireless communication device (WCD) 10 is shown configured for wireless communication with one or more wireless access points (WAP) 12 typically provided by a service provider (SP).
- WCDs include wireless telephones, digital readers, cameras, laptop computers, notebook computers, smart watches and tablet computers.
- the WCD 10 is a wireless telephone and so includes a wireless telephony transceiver 14 controlled by one or more WCD processors 16 accessing one or more computer readable storage media 18 such as read-only memory (ROM) and variants thereof, random access memory and variants thereof, and physically embodies as, for example, disk-based or solid-state storage.
- ROM read-only memory
- the WCD 10 includes a wireless telephony transceiver 14 controlled by one or more WCD processors 16 accessing one or more computer readable storage media 18 such as read-only memory (ROM) and variants thereof, random access memory and variants thereof, and physically embodies as, for example, disk-based or solid-state storage.
- ROM read-only memory
- the telephony transceiver 14 may be, without limitation, a Global Systems for Mobile communication (GSM) transceiver and variants thereof, code division multiple access (CDMA) transceiver and variants thereof, frequency division multiple access (FDMA) transceiver and variants thereof, time division multiple access (TDMA) transceiver and variants thereof, space division multiple access (SDMA) transceiver and variants thereof, orthogonal frequency division multiplexing (OFDM) transceiver and variants thereof, etc.
- GSM Global Systems for Mobile communication
- CDMA code division multiple access
- FDMA frequency division multiple access
- TDMA time division multiple access
- SDMA space division multiple access
- OFDM orthogonal frequency division multiplexing
- the WCD 10 may include other wireless transceivers as well.
- the WCD 10 may include a Wi-Fi transceiver 20 controlled by the processor 16 as well as a Bluetooth transceiver 22 controlled by the processor 16 .
- the processor 16 may output visible information in a display 24 , which may be a touchscreen display, and receive user input from a keypad 26 , which may be a physical keypad separate from the display 24 or which may be a virtual keypad presented on a touch sensitive display 24 .
- the processor 16 may receive position information from a position sensor, such as a global positioning satellite (GPS) receiver 27 .
- GPS global positioning satellite
- each network interface in the example shown, each transceiver 14 , 20 , 22 , is assigned a respective permanent media access control (MAC) address by the manufacturer of the device at the time of manufacture.
- This MAC address (or addresses when multiple network interfaces are provided) are unique to the WCD 10 , i.e., a MAC address uniquely identifies the WCD with which it is associated.
- Messages sent through a wireless interface typically include the MAC address so that the device essentially is revealing its unique identity every time it sends a message, although some telephony transceivers may use identifiers of the WCD other than the MAC.
- unique MAC addresses are used as an example of present principles, other device addresses that otherwise would uniquely identify the device may also be used.
- a MAC address may be e.g. 48-bits in length.
- a MAC address may consist of six groups of two hexadecimals separated by hyphens or colons, as in 12.34.56.78.90.ab. Some of the bits identify the organization that issued the address, while the remaining bits can be assigned as the organization desires subject to the constraint of uniqueness.
- FIG. 2 illustrates logic that the processor 16 or other processor can be configured to execute when accessing instructions on a computer readable storage medium.
- the use of flow chart format is for illustration only and is not a limitation, in that other logical forms such as state logic can be used.
- a respective unique address such as a permanent MAC address is associated with each respective wireless interface of the device 10 by the manufacturer of the device 10 at time of manufacture.
- one or more wireless interfaces that have been assigned a permanent MAC may also be assigned a set of plural temporary addresses.
- This set of temporary addresses may be assigned by the manufacturer of the device at time of manufacture, for example, or in another example may be assigned by the SP associated with the WAPs 12 at time of first contact of the device 10 with the WAPs 12 .
- the assigning entity of temporary MACs may or may not maintain a record of the device to which the temporary MACs were assigned. If the assigning entity records which device received which temporary MACs, that correlation information may be maintained in encrypted form and be unavailable to the network at large.
- the temporary MACs preferably are formatted in the same way as the permanent MAC so that they will be recognized as a valid MAC. That is, the temporary MACs preferably will have the same number of bits and same hexadecimal arrangement as the permanent MAC. However, whereas a portion of the permanent MAC indicates the manufacturer of the device 10 , the portion of each temporary MAC that otherwise would indicate a manufacturing entity according to a standard address format can be formatted to indicate an entity that does not exist, such that use of a temporary address does not identify the device with a manufacturing entity and, hence, in effect does not identify the device. Ideally, the temporary addresses may not be in a contiguous range which would indicate a single device. For example, there should not be any obvious relationship between the temporary addresses in some embodiments. In other embodiments, the temporary MACs may indicate the entity that assigned the temporary MACs to the device 10 .
- temporary MACs may use the same bit as the permanent MAC in indicating whether the temporary MAC is locally or universally administered. As understood herein, by assigning temporary MACs on this basis instead of randomly generating entire bit strings can alleviate the problem of a recipient receiving data that does not fit an expected format.
- the device 10 can prompt the user to select a privacy policy with respect to use of the temporary MACs.
- FIG. 3 is an example that informs.
- a user interface (UI) is shown that can be presented on the display 24 of the device 10 to enable the user to select ( 34 ) not to engage in private roaming according to description below, in which case the temporary MACs are not used and only the permanent MAC is conventionally used.
- the user can select ( 36 ) private roaming in which case the user may be given additional options if desired.
- the user can select to use the temporary MACs at least for roaming purposes according to principles below, and to automatically shift to using the permanent MAC in the event that an SP providing WAPs attempting to be contacted by the device 10 deny acceptance of temporary MACs.
- the user can select at 40 to be first warned that an SP providing WAPs attempting to be contacted by the device 10 denies acceptance of temporary MACs prior to shifting to use of the permanent MAC.
- the device 10 may cease communication with the WAP.
- FIG. 4 shows that at block 42 the processor 16 selects a first temporary MAC from the plural temporary MACs.
- a wireless network message such as a roaming message attempting to establish contact with a WAP is transmitted containing the temporary MAC selected at block 42 .
- Such a message may be referred to as a “ping”.
- a WAP is detected at decision diamond 46 (as indicated by, e.g., a response to a “ping” from a WAP), it is determined at decision diamond 48 in response whether the SP associated with the responding WAP permits private roaming using temporary MACs.
- the temporary MAC selected at block 42 is used at block 50 for communications with the responding WAP.
- another temporary MAC different from the MAC that was used for the “ping” message can be used.
- the permanent MAC can be used at block 50 for ensuing messages to the responding WAP, e.g., for messages attendant to user-driven voice and/or data communications.
- the logic moves to block 52 to operate per the user-defined privacy preferences exemplified in FIG. 3 .
- FIGS. 5-7 illustrate example logic for selecting new temporary MACs, it being understood that one or more selection criteria shown in FIGS. 5-7 may be employed.
- decision diamond 54 following selection of an initial temporary MAC and establishing communication with a WAP, it is determined whether communication with a WAP has been lost. If not, the currently selected temporary MAC may continue to be used in communication with that WAP at block 56 . However, upon loss of communication with a WAP the logic may select a new temporary MAC at block 58 for use in subsequently transmitted roaming messages using the newly selected temporary MAC at block 60 . In this way, if communication is again established either with the prior WAP or with a new WAP, the device 10 cannot be tracked as the user moves.
- a currently selected temporary MAC has been used for longer than a use period, e.g., five minutes. If not, the currently selected temporary MAC is continued to be used at block 64 . However, upon elapse of the use period the logic may select a new temporary MAC at block 66 for use in subsequently transmitted roaming messages using the newly selected temporary MAC at block 68 . In this way, tracking of the device 10 cannot occur for longer than the use period.
- a use period e.g., five minutes.
- the WCD has moved, e.g., beyond a threshold distance since start of use of the MAC, as indicated by, for example, signals from the GPS receiver 27 in FIG. 1 .
- Another indication that may be used to determine whether the WCD has moved is the acquisition by the WCD of a new WAP. If the WCD has not moved according to the test at decision diamond 70 , the currently selected temporary MAC is continued to be used at block 72 . However, if the WCD has moved away from the initial MAC position by the threshold distance, the logic may select a new temporary MAC at block 74 for use in subsequently transmitted roaming messages using the newly selected temporary MAC at block 76 .
- a wireless communication device may include at least one wireless transceiver and at least one processor configured for accessing a computer readable storage medium to execute instructions which configure the processor for monitoring the communication traffic to one or more wireless access points (WAPs) to learn which device addresses are already in use by other wireless communication devices, creating or selecting a first temporary device address that is different than devices already in use, sending a first wireless network message including the device address through the wireless transceiver pursuant to discovering a WAP that the user wishes to communicate with, continuing to monitor the communication traffic to one or more WAPs to learn if there are any new devices with device address in use by other wireless communication devices, creating or selecting a second address that is different than the devices in use, and sending a second wireless network message including the second address through the wireless transceiver pursuant to discovering a wireless access point (WAP).
- WAP wireless access point
- a wireless access point may include at least one wireless transceiver and at least one processor configured for accessing a computer readable storage medium to execute instructions which configure the processor for maintaining an access control list of wireless device addresses that can access the wireless access point where the access control list contains two or more entries for device addresses for a single wireless device, and granting access to the wireless network if a device address appears in the access control list.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
- The present application relates generally to enabling users to avoid having their wireless devices being tracked, recorded, and correlated by providing the devices with anonymous addresses for use in network transmissions.
- Note that the discussion below is background information only and is not intended as an admission that anything discussed necessarily is prior art.
- Tracking people by means of tracking their portable computing devices (such as wireless telephones) has become endemic. So called “smart phones” often support the wireless personnel area network (WPAN) technology, Bluetooth, and the wireless local area network (WLAN), technology IEEE 802.11, marketed under the Wi-Fi brand. And furthermore, as phones, they support cellular network technology. Because of their shorter range, the WPAN and WLAN technologies provide a convenient way to physically pin-point and track shoppers in a mall so that retailers can know how much time shoppers spend in various parts of a store and in front of store fronts and displays. In this way, the overall time in a store can be measured and effectiveness of store fronts and displays in arresting a shopper's attention can be inferred. Also, the number of repeat visits over periods of time can be tracked to learn whether customers are new or repeat. Such tracking information ostensibly is useful in rendering shopping more efficient and convenient to the shopper, as tracking information can be used to design more efficient store layouts, more informative signs, and so on such that shoppers can find products more easily.
- To enable tracking, monitoring stations are set up e.g. in the stores that act as wireless access points (WAPs) to initiate communication with mobile devices, but where network connectivity cannot be achieved. Alternatively, depending on the density of WAPs surrounding a store, monitoring stations are set-up that listen in on the communications between the mobile devices and these nearby WAPs. From the retailers' point of view, tracking people by means of their devices can even link a shopper's online shopping with his offline shopping, for example, by capturing a customer's name. This can be accomplished by first tracking and then capturing the customer's name right at the cash register when paying with a credit card which usually includes the customer's name, and then later correlating the customer's name to online databases. The retailer can then leverage both online and offline behavior against each other to increase sales. For example, the retailer may try to provide a coupon to that customer through email or webpage in order to bring that customer back into the store to shop.
- It should be noted, that with the device MAC address monitoring, it may be possible to track a person to an automobile, a physical residence and place of business. It does not matter that the content delivered over the network to/from that device may have been encrypted as device identifying information, e.g. the MAC address, is typically outside the data payload being protected by encryption.
- While tracking the wireless device of shoppers is attractive to retailers, as understood herein, not all shoppers are enthusiastic about being surreptitiously tracked every step of the way. Moreover, not entirely unfounded concerns have arisen over the potential for misusing pervasive, perpetual tracking information that ensnares most of the public. In short, present principles understand that more than a few shoppers might wish to remain anonymous as they gallivant through a shopping mall or in general cavort through life.
- Present principles understand that in some cases, interaction with the mobile device can be facilitated by faking the service set identifier (SSID) to popular distributed access points such as “attwifi” or “verizonwifi”. A mobile device configured to search for one these popular SSIDs will communicate in vain with the fake WAP in order to access the ATT or Verizon network. Furthermore, if combined with video from a webcam, it is possible to determine the age group and sex of the customer. Later, when that customer is detected as coming into the store, targeted advertising could be delivered using properly placed video monitors.
- And simply monitoring certain web data interactions, along with the MAC addresses, on the mobile devices might reveal the applications that are running on the devices. The applications, e.g. Facebook, might reveal if the customer is a child, teenager or young adult. And the MAC addresses often can reveal the type of mobile device that it is. For example, Sony's cell phone has an organizationally unique identifier (OUI) registered as “Sony_Mob” which can be assumed to be “Sony Mobile”—a MAC address assigned to Sony cellphones. By knowing what type of mobile device is, the types of loaded applications can often be inferred. For example, Apple iPhones in the ATT network might be expected to always have certain applications loaded. And Sony Experia smartphone in the Verizon network can be expected to have different applications loaded and running. In store targeted advertising can be directed to those mobile devices and applications.
- Thus, as understood herein, wireless device (and, hence, people) tracking is facilitated, however unwittingly, by network communication protocols, in which wireless devices are programmed to automatically seek out wireless access points (WAPs) using exploratory messages, colloquially referred to as “pings”. The wireless devices may continue to periodically ping the WAPs regardless of whether the WAP can be successfully accessed, e.g. the security keys are known or can be negotiated. Pinging enables the wireless device to ascertain the best WAP with which to communicate by determining e.g. signal strength, the name of the WAP, and whether or not a security key or credentials are required and available, so that a list of WAPs may be presented to the user for selection. After selecting one and entering any keys, if need be, the user of the device can browse Internet web pages, use email, send text messages and tweets, communicate by video conferencing, and so on using the WAP. The mobile device can usually be programmed to reconnect with the WAP in the future when the device comes into range of the WAP. As mentioned above, the retailer can take advantage of this fact by faking popular WAPs with SSIDs labeled with, for example, “attwifi” or “verizonwifi”. The device will see the SSID and maintain prolonged contact with the imposter WAP.
- In constantly, automatically, and unobtrusively (to the user) reaching out to the network, wireless devices send exploratory messages that include identifiers such as media access control (MAC) addresses. These are unique addresses, often one for each technology the device uses, e.g., one MAC address for Bluetooth, one for Ethernet, and one for Wi-Fi, that are unique to the device and that typically are assigned by the manufacturer of the device from a range allocated to that manufacturer and, hence, correlated to the device.
- MAC addresses can be used for access control to wired local area networks (LAN) and wireless local area network (WLAN). In some corporate environments with strict security policies, every device accessing a wired or wireless network must be known. And this can be done by manually including the MAC in an access control list that the WAP checks in order to create a connection with that device. Presumably, the WAP may be able to determine if the MAC is already in use elsewhere in the corporate environment. However, often times, access control may be done at a higher software layer of functionality that can use public/private key credentials using X.509 certificates and a protocol such as Transport Layer Security (TLS). TLS allows a client device to not only authenticate a server, but for the server to authenticate a client device in a process known as “mutual authentication”. By verifying the credentials of the client, e.g. the mobile device, the WAP, acting as a server, is able to grant access to the network. This can be in addition to or instead of using the MAC for access control. In large corporate environments, there may less risk of surreptitious tracking because the physical space may be controlled and there would be no WAPs other than those installed by the corporate entity. However, many corporate environments are shared with various businesses operating side-by-side. For example, someone could be parked in a car outside a place of business and wirelessly collect information from all the smart devices from the employees of that business. People can also be tracked while travelling in cars. Surreptitious tracking can therefore extend from retail, to vehicles, to residences and even places of business. It is possible to discover where people shop, drive, live and work.
- To allow devices to access wireless network environments where MAC access control is desired, it would be desirable to have a means to allow the WAP to recognize a device's MAC that is in use while still preventing correlation of addresses to specific devices by eavesdroppers.
- In public places such as coffee shops and airports, MAC addresses are usually not used for access control. In many cases, there may be no security at all. The content is sent in-the-clear. In hotels, there is often the need to input a WEP or WAP key to access a WAP. There may be the need to navigate a webpage for authorization, where a room number, name and payment information may be entered. But typically, a hotel does not require identification of the user's MAC address when accessing the wireless network. It is the same situation for most people's wireless home network. The WAP does not need to know the MAC address a priori. And so consequently, in most public places, the MAC address for a WLAN device is simply not checked against an access list. The only criteria being that the MAC must be unique among the devices accessing the WAP at a particular time and on a particular sub-net, which is important for low level routing of data packets—the so called “link layer”. Typically only the WAP cares about the MAC as the information that is sent on to remote servers are typically IP datagrams which doesn't include the MAC information on the so called “network layer”. And so for a non-MAC access controlled environment, while it may be important that the MAC be unique for a particular WAP, present principles recognize that the MAC could in fact be re-used with different mobile devices at different times. And different WAPs could have wireless devices accessing them independently with the same MAC at the same time.
- Thus, present principles recognize the desirability of having a means to prevent MAC tracking for situations when the WAP does not use the MAC for access control.
- The MAC address used in Ethernet style addressing consists of 48 bits of data. This is potentially a space of 248 or 281,474,976,710,656 possible MAC addresses. This is over 281 trillion addresses. The first 24 bits of the address may be an organizationally unique identifier (GUI). The remaining 24 bits are assigned by the owner or assignee of the OUI. The address space of the 24 bits is 224 or 16,777,216 MAC addresses. In one embodiment, a device according to present principles “pings” WAPs while roaming e.g. in public spaces uses completely random MACs using the entire 48 bit address space. The chances of a collision with another device with the same randomly chosen address are thus relatively small. Also, the device may select a random address using a reduced bit space, e.g. where the OUI bits may be set and the remaining bits are random. When selected, the MAC may be kept static for the period of the session. The addresses in this reduced bit space may still be so large that it would be unlikely for there to be a collision with another device talking to the same WAP. As a precaution, present principles recognize that it is possible for the device to monitor other devices communicating with the WAP to make sure that the random MAC chosen is not one that is in use. And if a conflict is detected with one in use, the device may simply change the MAC to a different one. It should be noted that depending on how many devices have the same OUI bits set, it may be possible to use the OUI bits to track a device.
- Furthermore, present principles recognize that in some embodiments, to address WAPs which may check the MAC of devices against an access control list, a device according to present teachings may “ping” WAPs using a MAC chosen from a group of possible MACs associated with a single device. Instead of an access list containing a single MAC for a device, it could contain, for example, 16 or 32 MAC addresses for a device. Ideally, there would be no correlation between MAC addresses so that by capturing one MAC address the mobile device could not be tracked through the other MAC addresses.
- Present principles also recognize that in some embodiments, a number of devices from a manufacturer may share a certain number of MAC addresses. When devices from the manufacturer come into the store and ping the WAP at different times, they may pick the same MAC. The device can monitor traffic to make sure that a shared MAC that is chosen is unique for the instance in time. This would confuse the store's MAC tracking system. The data collected along with the analytics would be “corrupted” with MAC addresses that represented communication from multiple devices and not just a single one.
- Present principles recognize a number of possible device behaviors when managing a fixed number of multiple MAC addresses. For example, whenever a public WAP is pinged while roaming around, when changing from one WAP to a different WAP, a different MAC from the group of MACs may be used. Further, the device may maintain the MAC for a period of time, e.g. 4 hours or 8 hours, before changing to another one. However, keeping the period of time short, e.g. 10 minutes, would keep a retailer from using tracking during a store visit which would typically be much long. Keeping the MAC stable may facilitate the hand-off from one WAP to another in case the device is in an active session and moving around (e.g., which may preserve the IP address). Also, if a device is in an active session, then the MAC could be made to not change during a hand-off from one WAP to another. Further still, present principles may recognize that devices may periodically log-out and back in to a WAP with a different MAC address. A device can therefore do this every 10 or 15 minutes and be hardly noticed by the user since a device can do this fairly rapidly taking a couple of seconds.
- In any case, the MACs are not “static” in the sense that their use is limited, meaning that a service provider (SP) of WAPs, e.g. owner of a department store, depending on the device settings cannot track the same MAC around as a person possessing the wireless device roams a store or subsequently visits the same store.
- If desired, once a WAP initially has been located using a MAC, and it is known to use MAC access control, user-driven data through that WAP may be conducted using the non-anonymous MAC of the device, e.g. unique or chosen from a group of MACs associated with that device, and then when communication with that WAP ceases, the device reverts to using changing anonymous, e.g. random, MACs to ping WAPs during subsequent roaming.
- The group of MACs through which the device cycles when roaming may be issued to the device by the manufacturer of the device, or by the SP of a network of WAPs. In any case, a device's MAC for a particular network may be non-static in that the group of MACs is cycled through during roaming, so that a monitor of WAPs cannot pin down the shopper using a particular MAC. In the case of a network with MAC access control, the MAC may be recognized as one of a number of MACs assigned to a particular device. If the WAP cannot handle multiple MACs assigned to a device, then the device may choose one of the MACs as its persistent or permanent MAC. This MAC may be assigned by the manufacturer or the service provider.
- In another aspect, a wireless communication device includes a wireless transceiver and a computer readable storage medium bearing a permanent address associated with the wireless transceiver and uniquely identifying the device and plural temporary addresses. The plural temporary addresses are provided by a manufacturer of the device or by a service provider (SP) of a wireless network. A processor is configured for accessing the computer readable storage medium to execute instructions which configure the processor for selecting a first temporary address from the plural temporary addresses, and sending a first wireless network message including the first temporary address through the wireless transceiver pursuant to discovering a wireless access point (WAP). The processor selects a second temporary address from the plural temporary addresses and sends a second wireless network message including the second temporary address through the wireless transceiver pursuant to discovering a WAP. If desired, the addresses can be media access control (MAC) addresses.
- In some implementations, the instructions when executed by the processor further configure the processor for using the permanent address for communication of user voice and/or user data messages through the wireless transceiver. This may be desired e.g. for WAPs which perform access control on the MAC and that do not have knowledge of the temporary MAC addresses. If desired, the instructions when executed by the processor further configure the processor for not using the permanent address for communication of user voice and/or user data messages through the wireless transceiver responsive to a signal from a WAP to use the permanent address, and instead using one of the temporary addresses for communication of user voice and/or user data messages through the wireless transceiver in the absence of a signal from a WAP to use the permanent address. Responsive to a signal from a WAP to use the permanent address, the device may cease communication with the WAP, and/or present an alert on the device perceptible by a person that a network does not permit anonymous communication.
- On the other hand, the instructions when executed by the processor may further configure the processor for using the permanent address for communication of user voice and/or user data messages through the wireless transceiver responsive to a signal from a WAP to use the permanent address. In this case one of the temporary addresses can be used for communication of user voice and/or user data messages through the wireless transceiver in the absence of a signal from a WAP to use the permanent address.
- In some embodiments a portion of each temporary address otherwise indicating a manufacturing entity according to a standard address format is formatted to indicate an entity that does not exist. In this way use of a temporary address does not identify the device with a manufacturing entity. The manufacturing entity is often a way to reveal the type of device.
- In another aspect, a method to prevent tracking a wireless device as it roams through a network of wireless access points (WAPs) includes selecting a first temporary MAC address from a group of temporary MAC addresses provided by a device manufacturer or by a service provider (SP) of the WAPs. The method also includes “pinging” for WAPs using the first temporary MAC address, and pinging for subsequent WAPs using a second temporary MAC address.
- The details of the present invention, both as to its structure and operation, can best be understood in reference to the accompanying drawings, in which like reference numerals refer to like parts, and in which:
-
FIG. 1 is a block diagram of an example wireless communication device (WCD) in one intended environment; -
FIG. 2 is a flow chart of example setup logic; -
FIG. 3 is a screen shot of an example display permitting a user of the WCD to establish a privacy preference; and -
FIGS. 4-7 are flow charts of example roaming logic. - Referring initially to
FIG. 1 , a wireless communication device (WCD) 10 is shown configured for wireless communication with one or more wireless access points (WAP) 12 typically provided by a service provider (SP). Non-limiting examples of WCDs include wireless telephones, digital readers, cameras, laptop computers, notebook computers, smart watches and tablet computers. - In the example shown, the
WCD 10 is a wireless telephone and so includes awireless telephony transceiver 14 controlled by one ormore WCD processors 16 accessing one or more computerreadable storage media 18 such as read-only memory (ROM) and variants thereof, random access memory and variants thereof, and physically embodies as, for example, disk-based or solid-state storage. Thetelephony transceiver 14 may be, without limitation, a Global Systems for Mobile communication (GSM) transceiver and variants thereof, code division multiple access (CDMA) transceiver and variants thereof, frequency division multiple access (FDMA) transceiver and variants thereof, time division multiple access (TDMA) transceiver and variants thereof, space division multiple access (SDMA) transceiver and variants thereof, orthogonal frequency division multiplexing (OFDM) transceiver and variants thereof, etc. - The
WCD 10 may include other wireless transceivers as well. For example, theWCD 10 may include a Wi-Fi transceiver 20 controlled by theprocessor 16 as well as aBluetooth transceiver 22 controlled by theprocessor 16. Theprocessor 16 may output visible information in adisplay 24, which may be a touchscreen display, and receive user input from akeypad 26, which may be a physical keypad separate from thedisplay 24 or which may be a virtual keypad presented on a touchsensitive display 24. Theprocessor 16 may receive position information from a position sensor, such as a global positioning satellite (GPS)receiver 27. - Typically, each network interface, in the example shown, each
transceiver WCD 10, i.e., a MAC address uniquely identifies the WCD with which it is associated. Messages sent through a wireless interface typically include the MAC address so that the device essentially is revealing its unique identity every time it sends a message, although some telephony transceivers may use identifiers of the WCD other than the MAC. Regardless, it is to be understood that while for disclosure purposes unique MAC addresses are used as an example of present principles, other device addresses that otherwise would uniquely identify the device may also be used. - A MAC address may be e.g. 48-bits in length. For example, a MAC address may consist of six groups of two hexadecimals separated by hyphens or colons, as in 12.34.56.78.90.ab. Some of the bits identify the organization that issued the address, while the remaining bits can be assigned as the organization desires subject to the constraint of uniqueness. With this general understanding in mind, attention is now drawn to
FIG. 2 . Like the other flow charts discussed herein,FIG. 2 illustrates logic that theprocessor 16 or other processor can be configured to execute when accessing instructions on a computer readable storage medium. The use of flow chart format is for illustration only and is not a limitation, in that other logical forms such as state logic can be used. - Commencing at
block 28, a respective unique address such as a permanent MAC address is associated with each respective wireless interface of thedevice 10 by the manufacturer of thedevice 10 at time of manufacture. Atblock 30 one or more wireless interfaces that have been assigned a permanent MAC may also be assigned a set of plural temporary addresses. This set of temporary addresses may be assigned by the manufacturer of the device at time of manufacture, for example, or in another example may be assigned by the SP associated with theWAPs 12 at time of first contact of thedevice 10 with theWAPs 12. The assigning entity of temporary MACs may or may not maintain a record of the device to which the temporary MACs were assigned. If the assigning entity records which device received which temporary MACs, that correlation information may be maintained in encrypted form and be unavailable to the network at large. - In any case, the temporary MACs preferably are formatted in the same way as the permanent MAC so that they will be recognized as a valid MAC. That is, the temporary MACs preferably will have the same number of bits and same hexadecimal arrangement as the permanent MAC. However, whereas a portion of the permanent MAC indicates the manufacturer of the
device 10, the portion of each temporary MAC that otherwise would indicate a manufacturing entity according to a standard address format can be formatted to indicate an entity that does not exist, such that use of a temporary address does not identify the device with a manufacturing entity and, hence, in effect does not identify the device. Ideally, the temporary addresses may not be in a contiguous range which would indicate a single device. For example, there should not be any obvious relationship between the temporary addresses in some embodiments. In other embodiments, the temporary MACs may indicate the entity that assigned the temporary MACs to thedevice 10. - Similarly, temporary MACs may use the same bit as the permanent MAC in indicating whether the temporary MAC is locally or universally administered. As understood herein, by assigning temporary MACs on this basis instead of randomly generating entire bit strings can alleviate the problem of a recipient receiving data that does not fit an expected format.
- Proceeding to block 32, the
device 10 can prompt the user to select a privacy policy with respect to use of the temporary MACs.FIG. 3 is an example that informs. A user interface (UI) is shown that can be presented on thedisplay 24 of thedevice 10 to enable the user to select (34) not to engage in private roaming according to description below, in which case the temporary MACs are not used and only the permanent MAC is conventionally used. - However, the user can select (36) private roaming in which case the user may be given additional options if desired. At 38 the user can select to use the temporary MACs at least for roaming purposes according to principles below, and to automatically shift to using the permanent MAC in the event that an SP providing WAPs attempting to be contacted by the
device 10 deny acceptance of temporary MACs. Or, the user can select at 40 to be first warned that an SP providing WAPs attempting to be contacted by thedevice 10 denies acceptance of temporary MACs prior to shifting to use of the permanent MAC. Until the user subsequently inputs a signal desiring to shift to the permanent MAC, thedevice 10 may cease communication with the WAP. - Assuming that use of temporary MACs at least for roaming purposes is instantiated,
FIG. 4 shows that atblock 42 theprocessor 16 selects a first temporary MAC from the plural temporary MACs. Moving to block 44, a wireless network message such as a roaming message attempting to establish contact with a WAP is transmitted containing the temporary MAC selected atblock 42. Such a message may be referred to as a “ping”. If a WAP is detected at decision diamond 46 (as indicated by, e.g., a response to a “ping” from a WAP), it is determined at decision diamond 48 in response whether the SP associated with the responding WAP permits private roaming using temporary MACs. If so, the temporary MAC selected atblock 42 is used atblock 50 for communications with the responding WAP. Alternatively, another temporary MAC different from the MAC that was used for the “ping” message can be used. Yet again, the permanent MAC can be used atblock 50 for ensuing messages to the responding WAP, e.g., for messages attendant to user-driven voice and/or data communications. On the other hand, if it determined at decision diamond 48 that the SP associated with the responding WAP does not permit private roaming using temporary MACs, the logic moves to block 52 to operate per the user-defined privacy preferences exemplified inFIG. 3 . -
FIGS. 5-7 illustrate example logic for selecting new temporary MACs, it being understood that one or more selection criteria shown inFIGS. 5-7 may be employed. Commencing atdecision diamond 54, following selection of an initial temporary MAC and establishing communication with a WAP, it is determined whether communication with a WAP has been lost. If not, the currently selected temporary MAC may continue to be used in communication with that WAP atblock 56. However, upon loss of communication with a WAP the logic may select a new temporary MAC atblock 58 for use in subsequently transmitted roaming messages using the newly selected temporary MAC atblock 60. In this way, if communication is again established either with the prior WAP or with a new WAP, thedevice 10 cannot be tracked as the user moves. - In
FIG. 6 , commencing atdecision diamond 62 it is determined whether a currently selected temporary MAC has been used for longer than a use period, e.g., five minutes. If not, the currently selected temporary MAC is continued to be used atblock 64. However, upon elapse of the use period the logic may select a new temporary MAC atblock 66 for use in subsequently transmitted roaming messages using the newly selected temporary MAC atblock 68. In this way, tracking of thedevice 10 cannot occur for longer than the use period. - In
FIG. 7 , commencing atdecision diamond 70 it is determined whether, since beginning use of a temporary MAC, the WCD has moved, e.g., beyond a threshold distance since start of use of the MAC, as indicated by, for example, signals from theGPS receiver 27 inFIG. 1 . Another indication that may be used to determine whether the WCD has moved is the acquisition by the WCD of a new WAP. If the WCD has not moved according to the test atdecision diamond 70, the currently selected temporary MAC is continued to be used atblock 72. However, if the WCD has moved away from the initial MAC position by the threshold distance, the logic may select a new temporary MAC atblock 74 for use in subsequently transmitted roaming messages using the newly selected temporary MAC at block 76. - Without reference to any particular figure it is to be understood that in some embodiments, a wireless communication device may include at least one wireless transceiver and at least one processor configured for accessing a computer readable storage medium to execute instructions which configure the processor for monitoring the communication traffic to one or more wireless access points (WAPs) to learn which device addresses are already in use by other wireless communication devices, creating or selecting a first temporary device address that is different than devices already in use, sending a first wireless network message including the device address through the wireless transceiver pursuant to discovering a WAP that the user wishes to communicate with, continuing to monitor the communication traffic to one or more WAPs to learn if there are any new devices with device address in use by other wireless communication devices, creating or selecting a second address that is different than the devices in use, and sending a second wireless network message including the second address through the wireless transceiver pursuant to discovering a wireless access point (WAP).
- Also in some embodiments, a wireless access point may include at least one wireless transceiver and at least one processor configured for accessing a computer readable storage medium to execute instructions which configure the processor for maintaining an access control list of wireless device addresses that can access the wireless access point where the access control list contains two or more entries for device addresses for a single wireless device, and granting access to the wireless network if a device address appears in the access control list.
- While the particular NETWORK DISCOVERY AND CONNECTION USING DEVICE ADDRESSES NOT CORRELATED TO A DEVICE is herein shown and described in detail, it is to be understood that the subject matter which is encompassed by the present invention is limited only by the claims.
Claims (20)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/044,353 US9647981B2 (en) | 2013-10-02 | 2013-10-02 | Network discovery and connection using device addresses not correlated to a device |
BR112016001679-3A BR112016001679B1 (en) | 2013-10-02 | 2014-09-26 | WIRELESS COMMUNICATION DEVICE |
PCT/US2014/057845 WO2015050794A1 (en) | 2013-10-02 | 2014-09-26 | Network discovery and connection using device addresses not correlated to a device |
RU2016105083A RU2635389C2 (en) | 2013-10-02 | 2014-09-26 | Network detection and connection using device address not correlated with device |
CN201480039877.XA CN105393568B (en) | 2013-10-02 | 2014-09-26 | Utilize the network discovery and connection with the incoherent device address of equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/044,353 US9647981B2 (en) | 2013-10-02 | 2013-10-02 | Network discovery and connection using device addresses not correlated to a device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150095501A1 true US20150095501A1 (en) | 2015-04-02 |
US9647981B2 US9647981B2 (en) | 2017-05-09 |
Family
ID=52741263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/044,353 Active 2035-10-01 US9647981B2 (en) | 2013-10-02 | 2013-10-02 | Network discovery and connection using device addresses not correlated to a device |
Country Status (5)
Country | Link |
---|---|
US (1) | US9647981B2 (en) |
CN (1) | CN105393568B (en) |
BR (1) | BR112016001679B1 (en) |
RU (1) | RU2635389C2 (en) |
WO (1) | WO2015050794A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150103776A1 (en) * | 2013-10-16 | 2015-04-16 | Nearbuy Systems, Inc. | Event driven anonymous device identifier generation |
US20160050559A1 (en) * | 2014-08-12 | 2016-02-18 | Lenovo (Singapore) Pte. Ltd. | Preventing Location Tracking Via Smartphone MAC Address |
US20160127324A1 (en) * | 2013-01-07 | 2016-05-05 | Richard Ferdinand | Privacy protected internet networks, subnetworks and sub-subnetworks |
WO2017092588A1 (en) * | 2015-12-03 | 2017-06-08 | 阿里巴巴集团控股有限公司 | Mac address allocation method, device and system |
US20170171737A1 (en) * | 2014-08-27 | 2017-06-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Method in a wireless communication network for notifying a communication device that context storing is employed in the network |
US10318758B2 (en) * | 2016-12-14 | 2019-06-11 | Blackberry Limited | Selectable privacy modes |
US10454887B2 (en) * | 2015-11-18 | 2019-10-22 | Cisco Technology, Inc. | Allocation of local MAC addresses to client devices |
US10771438B2 (en) | 2014-12-31 | 2020-09-08 | Interdigital Patent Holdings, Inc. | Context-based protocol stack privacy |
US20210294913A1 (en) * | 2018-08-07 | 2021-09-23 | Koch Industries, Inc. | Distributed ledger platform for access control |
US20240275758A1 (en) * | 2022-02-16 | 2024-08-15 | Cisco Technology, Inc. | Wireless client media access control (mac) address collision avoidance |
TWI855839B (en) * | 2023-08-25 | 2024-09-11 | 台達電子工業股份有限公司 | Packet verification system and method |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11190938B2 (en) * | 2017-09-29 | 2021-11-30 | Huawei Technologies Co., Ltd. | Device identifier access method and apparatus |
CN118749211A (en) * | 2022-03-04 | 2024-10-08 | Oppo广东移动通信有限公司 | Wireless communication method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050050352A1 (en) * | 2003-08-28 | 2005-03-03 | International Business Machines Corporation | Method and system for privacy in public networks |
US20140256262A1 (en) * | 2013-03-08 | 2014-09-11 | Minyoung Park | Device discovery with privacy support |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0216000D0 (en) | 2002-07-10 | 2002-08-21 | Nokia Corp | A method for setting up a security association |
JP3767561B2 (en) | 2002-09-02 | 2006-04-19 | ソニー株式会社 | Device authentication device, device authentication method, information processing device, information processing method, and computer program |
WO2005008994A1 (en) * | 2003-07-23 | 2005-01-27 | Samsung Electronics Co., Ltd. | Method and system for generating ip addresses of access terminals and transmitting messages for generation of ip addresses in an ip system |
US8009626B2 (en) | 2005-07-11 | 2011-08-30 | Toshiba America Research, Inc. | Dynamic temporary MAC address generation in wireless networks |
JP4816161B2 (en) * | 2006-03-10 | 2011-11-16 | 日本電気株式会社 | Wireless communication apparatus, MAC address management system, wireless communication method, and wireless communication program |
KR101299792B1 (en) | 2007-04-18 | 2013-08-23 | 엘지전자 주식회사 | Method for performing initial ranging in OFDMA based wireless communication system |
JP5402926B2 (en) * | 2008-05-16 | 2014-01-29 | 日本電気株式会社 | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION CONTROL PROGRAM |
US20120076072A1 (en) * | 2010-09-24 | 2012-03-29 | Marc Jalfon | System and method for maintaining privacy in a wireless network |
US9220007B2 (en) | 2011-02-17 | 2015-12-22 | Cisco Technology, Inc. | Wireless access point MAC address privacy |
US8824678B2 (en) | 2011-04-05 | 2014-09-02 | Broadcom Corporation | MAC address anonymizer |
-
2013
- 2013-10-02 US US14/044,353 patent/US9647981B2/en active Active
-
2014
- 2014-09-26 BR BR112016001679-3A patent/BR112016001679B1/en active IP Right Grant
- 2014-09-26 RU RU2016105083A patent/RU2635389C2/en active
- 2014-09-26 CN CN201480039877.XA patent/CN105393568B/en not_active Expired - Fee Related
- 2014-09-26 WO PCT/US2014/057845 patent/WO2015050794A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050050352A1 (en) * | 2003-08-28 | 2005-03-03 | International Business Machines Corporation | Method and system for privacy in public networks |
US20140256262A1 (en) * | 2013-03-08 | 2014-09-11 | Minyoung Park | Device discovery with privacy support |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160127324A1 (en) * | 2013-01-07 | 2016-05-05 | Richard Ferdinand | Privacy protected internet networks, subnetworks and sub-subnetworks |
US9667598B2 (en) * | 2013-01-07 | 2017-05-30 | Richard Ferdinand | Privacy protected internet networks, subnetworks and sub-subnetworks |
US20150103776A1 (en) * | 2013-10-16 | 2015-04-16 | Nearbuy Systems, Inc. | Event driven anonymous device identifier generation |
US20160050559A1 (en) * | 2014-08-12 | 2016-02-18 | Lenovo (Singapore) Pte. Ltd. | Preventing Location Tracking Via Smartphone MAC Address |
US9668126B2 (en) * | 2014-08-12 | 2017-05-30 | Lenovo (Singapore) Pte. Ltd. | Preventing location tracking via smartphone MAC address |
US20170171737A1 (en) * | 2014-08-27 | 2017-06-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Method in a wireless communication network for notifying a communication device that context storing is employed in the network |
US10771438B2 (en) | 2014-12-31 | 2020-09-08 | Interdigital Patent Holdings, Inc. | Context-based protocol stack privacy |
US10972430B2 (en) | 2015-11-18 | 2021-04-06 | Cisco Technology, Inc. | Allocation of local MAC addresses to client devices |
US10454887B2 (en) * | 2015-11-18 | 2019-10-22 | Cisco Technology, Inc. | Allocation of local MAC addresses to client devices |
WO2017092588A1 (en) * | 2015-12-03 | 2017-06-08 | 阿里巴巴集团控股有限公司 | Mac address allocation method, device and system |
CN106850865A (en) * | 2015-12-03 | 2017-06-13 | 阿里巴巴集团控股有限公司 | The distribution method of MAC Address, apparatus and system |
US10318758B2 (en) * | 2016-12-14 | 2019-06-11 | Blackberry Limited | Selectable privacy modes |
US20210294913A1 (en) * | 2018-08-07 | 2021-09-23 | Koch Industries, Inc. | Distributed ledger platform for access control |
US12105819B2 (en) * | 2018-08-07 | 2024-10-01 | Koch Capabilites, Llc. | Distributed ledger platform for access control |
US20240275758A1 (en) * | 2022-02-16 | 2024-08-15 | Cisco Technology, Inc. | Wireless client media access control (mac) address collision avoidance |
TWI855839B (en) * | 2023-08-25 | 2024-09-11 | 台達電子工業股份有限公司 | Packet verification system and method |
Also Published As
Publication number | Publication date |
---|---|
BR112016001679B1 (en) | 2022-12-20 |
US9647981B2 (en) | 2017-05-09 |
CN105393568A (en) | 2016-03-09 |
RU2016105083A (en) | 2017-08-16 |
CN105393568B (en) | 2019-10-01 |
RU2635389C2 (en) | 2017-11-13 |
WO2015050794A1 (en) | 2015-04-09 |
BR112016001679A2 (en) | 2017-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9647981B2 (en) | Network discovery and connection using device addresses not correlated to a device | |
KR102663781B1 (en) | Techniques for enabling computing devices to identify when they are in proximity to one another | |
Di Luzio et al. | Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests | |
US9253811B2 (en) | Network-assisted device-to-device communication | |
US8825767B2 (en) | Scalable secure wireless interaction enabling methods, system and framework | |
EP3928469B1 (en) | Method and system for detecting stations in wireless local area networks | |
EP2859699B1 (en) | Method for performing an interaction from a communicating device configured to establish a wireless communication channel and corresponding telecommunication system | |
US20150351004A1 (en) | Client-initiated tethering for electronic devices | |
KR102150659B1 (en) | A method for discovering devices based on a location information and apparatus thereof | |
US20100056182A1 (en) | System and method for providing location based services (lbs) to roaming subscribers in a wireless access network | |
EP2842360A1 (en) | Method and apparatus for wireless network access parameter sharing | |
JP2017505554A (en) | Peer-based authentication | |
Könings et al. | Device names in the wild: Investigating privacy risks of zero configuration networking | |
US7477632B1 (en) | Subscriber management and service profiles | |
WO2016090920A1 (en) | Shared wlan management method, system and wlan shared-registration server | |
US10171577B2 (en) | Local area networking system | |
US11363017B2 (en) | Smart home network security through blockchain | |
US9560158B2 (en) | Social networking using local area networks | |
US10560977B2 (en) | Method for performing an interaction from a communicating device configured to establish a wireless communication channel and corresponding telecommunication system | |
EP2749097B1 (en) | Authenticating a user's location in a femtocell-based network | |
KR20140088923A (en) | System for accessing wireless internet using personal wireless router, and method for the same | |
Waltari | Privacy-Aware Opportunistic Wi-Fi | |
US10237796B1 (en) | Packet gateway reassignment | |
WO2014074672A2 (en) | System and method for storing and retrieving information associated with a network location | |
JP2004363858A (en) | Radio communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SONY CORPORATION, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CANDELORE, BRANT;REEL/FRAME:031330/0551 Effective date: 20131001 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |